No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

The Psychology of Phishing Victims and How to Overcome it

Using Training to Avert Cyberattacks

by Stu Sjouwerman
July 16, 2020
in Cybersecurity
The Psychology of Phishing Victims and How to Overcome it

Phishing is often cited as responsible for more than 90% of all breaches. KnowBe4 founder and CEO Stu Sjouwerman provides practical guidance on how to mitigate this leading cyber risk.

Sponsored

Phishing is perhaps the greatest security risk that organizations face today. While companies tend to focus their cybersecurity efforts on technical defenses, the truth is that most cyberattacks take advantage of human fallibility. Data breaches and security incidents often start with phishing attacks, as Verizon’s 2020 Data Breach Investigations Report makes clear.

Successful cybercriminals take advantage of people, exploiting their usual pattern of thinking to gain access to personal information and accounts. Certain cognitive biases are widespread and extremely detrimental to online security, but this is not an insurmountable problem. With the right security awareness training, you can build a company culture that’s naturally resistant to cyberattacks and resilient in the face of security incidents. (Note: my company offers a suite of free phishing tools to phish your own employees.)

Cognitive Biases

Before you tackle the problem, it may be helpful to understand the psychology of phishing victims. A paper by Georgia Crossland, Ph.D. researcher at the Centre for Doctoral Training in Cyber Security, highlights two major psychological issues that lead people to misjudge potential security threats: overconfidence and fatalistic thinking.

“It Will Never Happen to Me”

Whether you call it optimism bias or overconfidence, people are alarmingly good at seeing risks in society and erroneously deciding that they only apply to other people. This leads most people to believe that they are less likely than others to experience negative events, from contracting a virus to being in a car crash to becoming the victim of an online scam.

“It’s Going to Happen Anyway”

Fatalistic thinking is also very common. Sometimes people feel that certain risks are beyond their control. They may decide that there’s nothing they can do to prevent these things from happening, so what’s the point of trying? If you believe that phishing attacks are inevitable, then you may decide it’s not worth taking precautions.

While this sounds like the opposite of overconfidence, the two thought patterns lead to the same endpoint: People fail to act to prevent or reduce risk. This creates a foundation for scammers to build upon.

Social Engineering

Cybercriminals rely upon social engineering to trick victims into replying to bogus emails, volunteering personal information, clicking on links to malware and opening attachments containing malware. Classic phishing techniques are all about emulating something familiar to the person being targeted, whether it’s a bank, an online service they use or the HR person of the company they work for. This familiarity leads victims to drop their guard.

Even well-crafted phishing scams usually contain telltale signs that people will often notice if they stop and think about it. That’s why cybercriminals create a false sense of urgency designed to persuade people to act immediately. This can be the carrot or the stick. For example, the threat that your account will be closed if you don’t respond quickly, or the promise of a pay out if you comply now.

By exploiting psychology, scammers can turn targets into victims.

Phishing is often just the first stage of a larger, more serious attack. It’s too easy to blame the victims here and decry employees as the weak link in your cybersecurity. But shaming people and pointing the finger is not an effective way forward. What organizations need to do is find a way to include employees, empower them and encourage a company culture that values security.

Security Awareness Training

It’s vital to have a mandatory security awareness training program in place for your employees, but there’s no reason it can’t be inclusive and fun. Rather than making it mandatory, training should engage participants and empower them. Make sure that you focus on rewarding the kind of behavior you want to see in the workplace and keep punitive action as a last resort.

Cybersecurity should be the responsibility of every employee, not an abstracted function of InfoSec professionals or IT departments.

If you get everyone to buy in, you can create a culture that dramatically reduces cybersecurity risks. A recent MIT Sloan Management Review article highlights three pillars of high-reliability organizations (HROs) that can be usefully applied to cybersecurity:

  1. Cultivate hypervigilance: People should be constantly watchful for any signs of cybersecurity threats, for themselves, the people around them and the wider organization. Speaking up should be encouraged and rewarded. When people turn a blind eye to potential issues, they grow into major problems.
  2. Respond quickly: Identify incidents swiftly and respond immediately. Having clear security procedures with established responsibilities and chains of communication will help enormously here. It’s crucial that people don’t bury their heads in the sand when security problems do inevitably crop up. The faster you react, the better your chances of limiting the negative impact of an incident.
  3. Share knowledge: Every failure is an opportunity to learn. Knowledge must be shared freely and widely. Security incidents should inform future policies. Successful cybersecurity strategies are constantly evolving and improving. People must work together and help each other to improve security company-wide.

Because smaller businesses may not have the same level of security resources, they tend to be easier targets for hacktivists. Traditional GRC offerings can be expensive and hard to manage without intervention by consultants. Going to the cloud offers reprieve on this front, and that’s where SaaS-based GRC platforms come into play. The KCM GRC platform (developed by my company KnowBe4) affords ready-made templates for quick compliance evaluations and reporting. Centralized policy distribution and tracking helps users remain compliant, as does flagging risky users.

While it won’t happen overnight, there are lots of easy, practical, useful steps you can take to overcome the psychology of phishing victims and improve your cybersecurity posture.

About KnowBe4

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, is used by more than 33,000 organizations around the globe. Founded by IT and data security specialist Stu Sjouwerman, KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud and other social engineering tactics through a new-school approach to awareness training on security. Kevin Mitnick, an internationally recognized cybersecurity specialist and KnowBe4’s Chief Hacking Officer, helped design the KnowBe4 training based on his well-documented social engineering tactics. Tens of thousands of organizations rely on KnowBe4 to mobilize their end users as the last line of defense.


Tags: CybercrimeData BreachTraining
Previous Post

Smarsh Introduces Voice Capture and Archiving for MS Teams

Next Post

Bolstering Compliance as Global COVID Fraud Enforcement Takes Shape

Stu Sjouwerman

Stu Sjouwerman

SjouwermanStu Sjouwerman is founder and CEO of KnowBe4 [NASDAQ: KNBE], developer of security awareness training and simulated phishing platforms, with 41,000 customers and more than 25 million users. He was co-founder of Sunbelt Software, the anti-malware software company acquired in 2010. He is the author of four books, including “Cyberheist: The Biggest Financial Threat Facing American Businesses.” He can be reached at ssjouwerman@knowbe4.com.

Related Posts

Ethiciti AI Transforming Online Compliance Training

How AI is Transforming Online Compliance Training

by Corporate Compliance Insights
June 3, 2025

Is your compliance training keeping up with AI innovation? Whitepaper How AI is Transforming Online Compliance Training What's in this...

matrix numbers cybersecurity concept

Why Scalable Global Frameworks Like ISO 27001 Matter

by Sam Peters
May 29, 2025

Updated security standard addresses modern threats with expanded digital protections

Ethiciti Neuroscience Compliance Training

Neuroscience of Compliance Training

by Corporate Compliance Insights
May 14, 2025

Is your compliance training working with your employees' brains or against them? Whitepaper Neuroscience-Driven Training Techniques What’s in this whitepaper...

new york and us flags

New York Tightens the Breach Clock: 30 Days to Notify

by Melissa Crespo and Reiley Porter
May 12, 2025

State joins growing national trend toward broader personal information definitions and stricter notification timelines for data compromises

Next Post
Gavel Law Hammer with Coronavirus Covid-19 3D image

Bolstering Compliance as Global COVID Fraud Enforcement Takes Shape

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights